Filtry
wszystkich: 68
Wyniki wyszukiwania dla: secure set
-
Graph security testing
PublikacjaSet S ⊂ V is called secure set iff ∀ X ⊂ S | N [ X ] ∩ S | ≥ | N ( X ) \ S | [3]. That means that every subset of a secure set has at least as many friends (neighbour vertices in S) as enemies (neighbour vertices outside S) and will be defended in case of attack. Problem of determining if given set is secure is co −NP -complete, there is no efficient algorithm solving it [3]. Property testers are algorithms that distinguish inputs...
-
Global defensive secure structures
PublikacjaLet S ⊂ V (G) for a given simple non-empty graph G. We define for any nonempty subset X of S the predicate SECG,S(X) = true iff |NG[X]∩S| ≥ |NG[X]\S|. Let H be a non-empty family of graphs such that for each vertex v ∈ V (G) there is a subgraph H of G containing v and isomorphic to a member of H. We introduce the concept of H-alliance extending the concept of global defensive secure structures. By an H-alliance in a graph G we...
-
Algorithms for testing security in graphs
PublikacjaIn this paper we propose new algorithmic methods giving with the high probability the correct answer to the decision problem of security in graphs. For a given graph G and a subset S of a vertex set of G we have to decide whether S is secure, i.e. every subset X of S fulfils the condition: |N[X] \cap S| >= |N[X] \ S|, where N[X] is a closed neighbourhood of X in graph G. We constructed a polynomial time property pseudotester based...
-
A Concept of Using Knowledge Models to Secure Intellectual Capital in Enterprise
PublikacjaWithout a doubt, knowledge has become the most important resource for all companies in the world. Knowledge extended of our own observations and practice is being called experience. With the increase of knowledge and gained experience, the individual becomes more and more valuable employee in terms of business. The above mentioned knowledge can be gained only by self-improvement, which requires time and other necessary elements...
-
Low-dimensional bound entanglement with one-way distillable cryptographic key
PublikacjaIn this paper, we provide a class of bound entangled states that have positive distillable secure key rate. The smallest state of this kind is 4 circle times 4, which shows that peculiar security contained in bound entangled states does not need high-dimensional systems. We show that for these states a positive key rate can be obtained by one-way Devetak-Winter (DW) protocol. Subsequently, the volume of bound entangled key-distillable...
-
No Quantum Realization of Extremal No-Signaling Boxes
PublikacjaThe study of quantum correlations is important for fundamental reasons as well as for quantum communication and information processing tasks. On the one hand, it is of tremendous interest to derive the correlations produced by measurements on separated composite quantum systems from within the set of all correlations obeying the no-signaling principle of relativity, by means of information-theoretic principles. On the other hand,...
-
Cost‐efficient performance‐driven modelling of multi‐band antennas by variable‐fidelity electromagnetic simulations and customized space mapping
PublikacjaElectromagnetic (EM) simulations have become an indispensable tool in the design of contemporary antennas. EM‐driven tasks, for example, parametric optimization, entail considerable computational efforts, which may be reduced by employing surrogate models. Yet, data‐driven modelling of antenna characteristics is largely hindered by the curse of dimensionality. This may be addressed using the recently reported domain‐confinement...
-
Device-independent quantum key distribution based on measurement inputs
PublikacjaWe provide an analysis of a family of device-independent quantum key distribution (QKD) protocols that has the following features. (a) The bits used for the secret key do not come from the results of the measurements on an entangled state but from the choices of settings. (b) Instead of a single security parameter (a violation of some Bell inequality) a set of them is used to estimate the level of trust in the secrecy of the key....
-
Experimental certification of more than one bit of quantum randomness in the two inputs and two outputs scenario
PublikacjaOne of the striking properties of quantum mechanics is the occurrence of the Bell-type non-locality. They are a fundamental feature of the theory that allows two parties that share an entangled quantum system to observe correlations stronger than possible in classical physics. In addition to their theoretical significance, non-local correlations have practical applications, such as device-independent randomness generation, providing...
-
Performance Analysis of the "Intelligent" Kirchhoff- Law - Johnson-Noise Secure Key Exchange
PublikacjaThe Kirchhoff-law - Johnson-noise (KLJN) secure key distribution system provides a way of exchanging theoretically secure keys by measuring random voltage and current through the wire connecting two different resistors at Alice’s and Bob’s ends. Recently new advanced protocols for the KLJN method have been proposed with enhanced performance. In this paper, we analyze the KLJN system and compare with the „intelligent” KLJN (iKLJN)...
-
BeesyBees: A mobile agent-based middleware for a reliable and secure execution of service-based workflow applications in BeesyCluster
PublikacjaIntegrating distributed services into workflows comes with its own set of challenges, including security, coordination, fault tolerance and optimisation of execution time. This paper presents an architecture and implementation - nicknamed BeesyBees - that allows distributed execution of workflow applications in BeesyCluster using agents. BeesyCluster is a middleware that allows users to access distributed resources as well as publish...
-
Secure Italian domination in graphs
PublikacjaAn Italian dominating function (IDF) on a graph G is a function f:V(G)→{0,1,2} such that for every vertex v with f(v)=0, the total weight of f assigned to the neighbours of v is at least two, i.e., ∑u∈NG(v)f(u)≥2. For any function f:V(G)→{0,1,2} and any pair of adjacent vertices with f(v)=0 and u with f(u)>0, the function fu→v is defined by fu→v(v)=1, fu→v(u)=f(u)−1 and fu→v(x)=f(x) whenever x∈V(G)∖{u,v}. A secure Italian dominating...
-
Blockchain based Secure Data Exchange between Cloud Networks and Smart Hand-held Devices for use in Smart Cities
PublikacjaIn relation to smart city planning and management, processing huge amounts of generated data and execution of non-lightweight cryptographic algorithms on resource constraint devices at disposal, is the primary focus of researchers today. To enable secure exchange of data between cloud networks and mobile devices, in particular smart hand held devices, this paper presents Blockchain based approach that disperses a public/free key...
-
The methods of secure data transmission in the KNX system
PublikacjaThe article presents the demands concerning data security in distributed building automation systems and shows the need for providing mechanisms of secure communication in the KNX system. Three different methods developed for KNX data protection are discussed: EIBsec, KNX Data Security and the author's method. Their properties are compared and potential areas of application are presented.
-
The Transmission Protocol of Sensor Ad Hoc Networks
PublikacjaThis paper presents a secure protocol for a radio Ad Hoc sensor network. This network uses the TDMA multiple access method. The transmission rate on the radio channel is 57.6 kbps. The paper presents the construction of frames, types of packets and procedures for the authentication, assignment of time slots available to the node, releasing assigned slots and slots assignment conflict detection.
-
The secure transmission protocol of sensor Ad Hoc network
PublikacjaThe paper presents a secure protocol of radio Ad Hoc sensor network. This network operates based on TDMA multiple access method. Transmission rate on the radio channel is 57.6 kbps. The paper presents the construction of frames, types of packets and procedures for the authentication, assignment of time slots available to the node, releasing assigned slots and slots assignment conflict detection.
-
Immunizing the Hillcast Method against the Known-Plaintext Attack using Periodic Key Exchange
PublikacjaThis paper considers a Joint Fingerprinting and Decryption method, called Hillcast, for the copyright protection and traitor tracing in case of Video on Demand services. Because the method is based on the Hill cipher, it is vulnerable to a known-plaintext attack. The goal of this paper is to present an efficient periodic key exchange mechanism to make this method secure without compromising its scalability, imperceptibility or...
-
Secure Quaternion Feistel Cipher for DICOM Images
PublikacjaAn improved and extended version of a quaternion-based lossless encryption technique for digital image and communication on medicine (DICOM) images is proposed. We highlight and address several security flaws present in the previous version of the algorithm originally proposed by Dzwonkowski et al. (2015). The newly proposed secure quater- nion Feistel cipher (S-QFC) algorithm...
-
EVALUATION OF THE EFFICIENCY OF FLEXICURITY IMPLEMENTATION IN OECD COUNTRIES
PublikacjaFlexicurity is a policy of flexible and secure labour market. It has been the subject of many analyses, however, a coherent evaluation methodology is difficult to specify. The purpose of this paper is to propose a Data Envelopment Analysis based model for the evaluation of the efficiency of flexicurity implementation in OECD countries. The results will be used to create the ranking of countries, to determine changes in time, and...
-
Experimental Extraction of Secure Correlations from a Noisy Private State
PublikacjaWe report experimental generation of a noisy entangled four-photon state that exhibits a separation between the secure key contents and distillable entanglement, a hallmark feature of the recently established quantum theory of private states. The privacy analysis, based on the full tomographic reconstruction of the prepared state, is utilized in a proof-of-principle key generation. The inferiority of distillation-based strategies...
-
W-like bound entangled states and secure key distillation
PublikacjaWe construct multipartite entangled states with underlying W-type structuresatisfying positive partial transpose (PPT) condition under any (N −1)|1 partition. Then we showhow to distill a N-partite secure key from the states using two different methods: direct applicationof local filtering and novel random key distillation scheme in which we adopt the idea from recentresults on entanglement distillation. Open problems and possible...
-
Security Requirements and Controls for Incident Information Sharing in the Polish Power System
PublikacjaAmong the strategies of protecting information assets of the power system, sharing of information about current cybersecurity incidents between energy operators appears to be a prerequisite. Exchange of information leads to the effective detection of attacks and exploited vulnerabilities as well as the identification of countermeasures. This paper presents the results of continuation of our works on developing a secure and efficient...
-
Critical Remarks on Landauer’s principle of erasure– dissipation: Including notes on Maxwell demons and Szilard engines
PublikacjaWe briefly address Landauer’s Principle and some related issues in thermal demons. We show that an error-free Turing computer works in the zero-entropy limit, which proves Landauer’s derivation incorrect. To have a physical logic gate, memory or information-engine, a few essential components necessary for the operation of these devices are often neglected, such as various aspects of control, damping and the fluctuation–dissipation...
-
Selfish Attacks in Two-Hop IEEE 802.11 Relay Networks: Impact and Countermeasures
PublikacjaIn IEEE 802.11 networks, selfish stations can pursue a better quality of service through selfish MAC-layer attacks. Such attacks are easy to perform, secure routing protocols do not prevent them, and their detection may be complex. Two-hop relay topologies allow a new angle of attack: a selfish relay can tamper with either source traffic, transit traffic, or both. We consider the applicability of selfish attacks and their variants...
-
Approaching Secure Industrial Control Systems
PublikacjaThis study presents a systematic approach to secure industrial control systems based on establishing a business case followed by the development of a security programme. To support these two fundamental activities the authors propose a new method for security cost estimation and a security assessment scheme. In this study they explain the cost evaluation technique and illustrate with a case study concerning the assessment of the...
-
Ancillary services to grids provided with distributed generation
PublikacjaThe paper introduces system for utilization of the customer-side generated energy. Additionally system can secure some ancillary services to grids. Those services include: current active filtering, load voltage stabilization and in case of grid voltage faults - uninterruptible load supplying (possible with energy storage device). Presented experimental results confirm flexibility of this arrangement in processes of power delivery...
-
The project IDENT: Multimodal biometric system for bank client identity verification
PublikacjaBiometric identity verification methods are implemented inside a real banking environment comprising: dynamic handwritten signature verification, face recognition, bank cli-ent voice recognition and hand vein distribution verification. A secure communication system based on an intra-bank client-server architecture was designed for this purpose. Hitherto achieved progress within the project is reported in this paper with a focus...
-
REVITALIZATION PROJECT OF SLUM TRANSFORMATION: A CASE STUDY HAY-AL TANAK,BEIRUT,LEBANON
PublikacjaSlums are global phenomena that exist as a solution for those who couldn’t afford a house. This phenomenon is growing accompanying the rapid urbanization and the growth of the urban population, three-quarter of the world population anticipated to live in an urban environment by 2050 (Avis, 2016, p. 57). This paper reviews slum's evaluation of the revitalization project for one of the poorest slums in Beirut called Hay-Al Tanak....
-
Mobility Managment Scenarios for IPv6 Networks-Proxy Mobile IP-v6Implementation Issues
PublikacjaManagement of user at the network layer plays an important role in efficient network operation. In the paper, authors' implementation of one of network-based mobility management models, namely Proxy Mobile IPv6, is presented and tested in a number of networking topologies and communication scenarios. The proposed implementation covers PMPIv6 functionality with optional security extensions (use of Diameter protocol) and handover...
-
Karhunen-Loeve-based approach to tracking of rapidly fading wireless communication channels
PublikacjaWhen parameters of wireless communication channels vary at a fast rate, simple estimation algorithms, such as weighted least squares (WLS) or least mean squares (LMS) algorithms, cannot estimate them with the accuracy needed to secure the reliable operation of the underlying communication systems. In cases like this, the local basis function (LBF) estimation technique can be used instead, significantly increasing the achievable...
-
Internationalization and Quality Assurance in Higher Education
PublikacjaInternationalization is an inevitable phenomenon among all contemporary higher education institutions (HEIs) in a globalizing world. It is the driving force for development and progress. In course of the last 30 years, it became an inevitable element of HE management. However, it carries along a number of risks, pitfalls, and organizational challenges. To hedge those, quality assurance (QA) is called to the stage. HEIs therefore...
-
Integrated functional safety and cyber security analysis
PublikacjaThe chapter is devoted some important issues of the functional safety analysis, in particular the safety integrity level (SIL) verification of safety functions to be implemented within the distributed control and protection systems with regard to security aspects. A method based on quantitative and qualitative information is proposed for the SIL (IEC 61508, 61511) verification with regard of the evaluation assurance levels (EAL)...
-
Analysis and Comparison of Safety of Children and Adult Passenger in Car Based on Crash Tests Results
PublikacjaMost important features of the child seat were presented. There was made analysis of selected dynamic loads acting on mannequins heads during a collision. Comparison of loads acting on the kid in a child seat and the other passengers in a car is presented. In analysis of the results particular attention has been paid on the children's secure in a car. The phenomena of collision child's occipital bone with seat backrest was described....
-
Hedging Strategies of Derivatives Instruments for Commodity Trading Entities
PublikacjaHedging as an outcome of risk management arises to account several questions. Mentioned aspect of size of the hedging is one of them. Latter questioning refers to whether producer of manufacturer are willing to secure entire exposure, when the hedging should start, now or later in the future, what is the vision on market like direction of market, time of interest, magnitude of exposure, what would be the preferred instruments of...
-
E-Voting System Evaluation Based on the Council of Europe Recommendations: nVotes
PublikacjaE-voting implantation has been facing important challenges in recent years. Several incidents, together with a lack of evaluation methodologies social and cultural customs hinder a broader application. In this work, the authors aim to contribute to a safer introduction of e-voting tools by applying a practical evaluation framework strongly based on the security requirements issued by the Council of Europe (CoE) in 2017 to nvotes,...
-
Integrated safety and security analysis of hazardous plants and systems of critical infrastructure
PublikacjaThis article addresses an integrated safety and security analysis approach of hazardous industrial plants and systems of critical infrastructure. Nowadays due to new hazards that emerge there are opinions among experts that these issues require an integrated approach in life cycle, from the design concept, through the design and operation of the plant, to its decommissioning. It is proposed to start from an interesting methodology...
-
On Design Optimization of Miniaturized Microscrip Dual-Band Rat-Race Coupler with Enhanced Bandwidth
PublikacjaIn the paper, a novel topology of a miniaturized wideband dual-band rat-race coupler has been presented. Small size of the circuit has been obtained by meandering transmission lines of the conventional circuit. At the same time, the number of independent geometry parameters has been increased in order to secure sufficient circuit flexibility in the context of its design optimization for dual-band operation. Optimum dimensions of...
-
Quantum security and theory of decoherence
PublikacjaWe sketch a relation between two crucial, yet independent, fields in quantum information research, viz. quantum decoherence and quantum cryptography. We investigate here how the standard cryptographic assumption of shielded laboratory, stating that data generated by a secure quantum device remain private unless explicitly published, is disturbed by the einselection mechanism of quantum Darwinism explaining the measurement process...
-
Guaranteeing Threshold Attendance of W/WSAN nodes in a reverted security paradigm
PublikacjaWe consider a Wireline/Wireless Sensor and Actor Network composed of sensor/actor nodes and a data sink/command center (DSCC). Each node controls a generic device that can be in- or out-of-service, corresponding to the ENABLED or DISABLED node state. The node senses the device's intention to change state, and notifies and/or requests the DSCC for authorization to act upon the device. Motivated by requirements for critical infrastructures...
-
Realistic noise-tolerant randomness amplification using finite number of devices
PublikacjaRandomness is a fundamental concept, with implications from security of modern data systems, to fundamental laws of nature and even the philosophy of science. Randomness is called certified if it describes events that cannot be pre-determined by an external adversary. It is known that weak certified randomness can be amplified to nearly ideal randomness using quantum-mechanical systems. However, so far, it was unclear whether randomness amplification...
-
Analysis of an Attenuator Artifact in an Experimental Attack by Gunn–Allison–Abbott Against the Kirchhoff-Law–Johnson-Noise (KLJN) Secure Key Exchange System
PublikacjaA recent paper by Gunn–Allison–Abbott (GAA) [L. J. Gunn et al., Scientific Reports 4 (2014) 6461] argued that the Kirchhoff-law–Johnson-noise (KLJN) secure key exchange system could experience a severe information leak. Here we refute their results and demonstrate that GAA’s arguments ensue from a serious design flaw in their system. Specifically, an attenuator broke the single Kirchhoff-loop into two coupled loops, which is an...
-
Interaction with medical data using QR-codes
PublikacjaBar-codes and QR-codes (Quick Response ) are often used in healthcare. In this paper an application of QR-codes to exchange of laboratory results is presented. The secure data exchange is proposed between a laboratory and a patient and between a patient and Electronic Health Records. Advanced Encryption Standard was used to provide security of data encapsulated within a QR-code. The experimental setup, named labSeq is described....
-
Towards Healthcare Cloud Computing
PublikacjaIn this paper we present construction of a software platform for supporting medical research teams, in the area of impedance cardiography, called IPMed. Using the platform, research tasks will be performed by the teams through computer-supported cooperative work. The platform enables secure medical data storing, access to the data for research group members, cooperative analysis of medical data and provide analysis supporting tools...
-
Przydatność białka rybiego w postaci kolagenu lub żelatyny oraz polisacharydu - kapa-karagenu do wytwarzania aktywnych opakowań biodegradowalnych = Usefulness of fish collagen, gelatin and carrageenan for preparation of active biodegradable packages
PublikacjaSummary - The possibility of use of protein films made of fish collagen or gelatin as well as polysaccharide carrageenan films as carriers of enzymes (lysozyme or lysostaphyne), for preparation of microbiologically active packages, was investigated. It was found that crosslinking of such systems with N-[3(dimethylamino)propyl]-N'-ethylcarboimide (EDC) does not influence the activity of lysozyme immobilized in the films (Table 1)....
-
Quantum privacy witness
PublikacjaWhile it is usually known that the mean value of a single observable is enough to detect entanglement or its distillability, the counterpart of such an approach in the case of quantum privacy has been missing. Here we develop the concept of a privacy witness, i.e., a single observable that may detect the presence of the secure key even in the case of bound entanglement. Then we develop the notion of secret-key estimation based...
-
Practical I-Voting on Stellar Blockchain
PublikacjaIn this paper, we propose a privacy-preserving i-voting system based on the public Stellar Blockchain network. We argue that the proposed system satisfies all requirements stated for a robust i-voting system including transparency, verifiability, and voter anonymity. The practical architecture of the system abstracts a voter from blockchain technology used underneath. To keep user privacy, we propose a privacy-first protocol that...
-
A structure and design optimization of novel compact microscrip dual-band rat-race coupler with enhanced bandwidth
PublikacjaIn the letter, a topology of a novel compact wideband dual-band rat-race coupler has been presented along with its computationally efficient design optimization procedure. Reduction of the circuit size has been achieved by meandering transmission lines of the conventional circuit. At the same time, the number of independent geometry parameters has been increased so as to secure sufficient flexibility of the circuit, necessary in...
-
Edge-Computing based Secure E-learning Platforms
PublikacjaImplementation of Information and Communication Technologies (ICT) in E-Learning environments have brought up dramatic changes in the current educational sector. Distance learning, online learning, and networked learning are few examples that promote educational interaction between students, lecturers and learning communities. Although being an efficient form of real learning resource, online electronic resources are subject to...
-
Whirling system of water exchangein breeding pools
PublikacjaTo secure the proper conditions of life for sea mammals existing in closed systems one has to maintain the character of the breeding basins (i.e. shape, dimensions, facing of walls and bottom, quality and motion of water) as natural as possible. An appropriate system of water exchange plays a very important role here. A full renewal of water is time-consuming, expensive and troublesome, so can be made only periodically, and should...
-
Modeling an Industrial Revolution: How to Manage Large-Scale, Complex IoT Ecosystems?
PublikacjaAdvancements around the modern digital industry gave birth to a number of closely interrelated concepts: in the age of the Internet of Things (IoT), System of Systems (SoS), Cyber-Physical Systems (CPS), Digital Twins and the fourth industrial revolution, everything revolves around the issue of designing well-understood, sound and secure complex systems while providing maximum flexibility, autonomy and dynamics. The aim of the...